www.businesswire.com
Open in
urlscan Pro
23.37.36.148
Public Scan
URL:
https://www.businesswire.com/news/home/20231025780908/en/ThreatNG-Revolutionizes-Security-Assessment-with-Groundbreaking-Secu...
Submission: On November 24 via manual from IN — Scanned from DE
Submission: On November 24 via manual from IN — Scanned from DE
Form analysis
1 forms found in the DOMName: bw-search-form — POST /portal/site/home/template.SINGLEPORTLET/action.process/permalink/?javax.portlet.action=true¤tTemplateID=PAGE&javax.portlet.tpst=503a8767054f0df6a9e77a100d908a0c&javax.portlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vignette.cachetoken
<form id="bw-search-form" name="bw-search-form"
action="/portal/site/home/template.SINGLEPORTLET/action.process/permalink/?javax.portlet.action=true&currentTemplateID=PAGE&javax.portlet.tpst=503a8767054f0df6a9e77a100d908a0c&javax.portlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vignette.cachetoken"
method="post">
<fieldset>
<div id="bw-search-options">
<h3 id="bw-search-options-head" class="toggler hidden"><span>Search Options</span></h3>
<div id="bw-search-filter-links" class="togglee">
<ul>
<li><a href="#?type=all" id="bw-search-filter-all" title="Search All" class="is-selected">Search All</a></li>
<li><a href="#?type=news" id="bw-search-filter-news" title="Search News">Search News</a></li>
<li><a href="#?type=site" id="bw-search-filter-site" title="Search Site">Search Site</a></li>
<li>
<a href="/portal/site/home/search?javax.portlet.tpst=503a8767054f0df6a9e77a100d908a0c&javax.portlet.pbp_503a8767054f0df6a9e77a100d908a0c_view=advancedSearch&javax.portlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vignette.cachetoken" id="bw-search-filter-adv" title="Advanced News Search">Advanced News Search</a>
</li>
</ul>
</div>
</div>
<label for="bw-search-input">Advanced News Search</label>
<input type="search" id="bw-search-input" name="q" maxlength="256" value="" title="Search BusinessWire.com" placeholder="Search">
<input type="hidden" id="bw-search-type" name="qSearchType" value="all">
<button type="submit" class="bw-button-primary" id="bw-search-button" title="Search"><span><img src="/images/icons/icon_search.gif" alt="Search"></span></button>
</fieldset>
</form>
Text Content
THREATNG REVOLUTIONIZES SECURITY ASSESSMENT WITH GROUNDBREAKING SECURITY AND CYBERSECURITY RATINGS BACKED BY EXTERNAL ATTACK SURFACE AND DIGITAL RISK INTELLIGENCE FOR UNMATCHED CLARITY AND VALIDITY IN SCORING A New Approach in Cybersecurity Scoring: ThreatNG Security Ratings Redefines Precision and Insight October 25, 2023 10:10 AM Eastern Daylight Time NEW YORK--(BUSINESS WIRE)--ThreatNG, a leading innovator in digital presence security, threat, and risk solutions, is proud to announce the release of its game-changing Security Ratings capability. This groundbreaking feature is substantiated and proven with external attack surface and digital risk intelligence, setting new industry standards for clarity, validity, and fidelity in security scoring. > “The ThreatNG Susceptibility and eXposure Security Ratings empower > organizations with a consolidated and contextualized external view of their > digital presence to allocate resources effectively, implement targeted > security measures, enhance risk management, and ensure compliance, bolstering > their cybersecurity posture and resilience” > > Post this Organizations require more robust and accurate external security assessments to safeguard their digital assets effectively with the ever-evolving threat landscape and the increasing complexity of cyberattacks. ThreatNG Security Ratings addresses this critical need by providing in-depth insights into an organization's security posture, backed by comprehensive external attack surface analysis and digital risk intelligence. Enhancing Security Ratings with Comprehensive External Intelligence ThreatNG Security Ratings benefit from an array of investigation modules that provide unparalleled clarity, validity, and fidelity to organizations worldwide. These modules include Domain Intelligence, Social Media Monitoring, Sensitive Code Exposure Detection, Search Engine Exploitation Alerts, Cloud and SaaS Exposure Assessment, Online Sharing Exposure Evaluation, Sentiment and Financial Analysis, Archived Web Page Scrutiny, Dark Web Presence Monitoring, and Technology Stack Assessment. With Security Ratings backed by these investigation modules, organizations can make informed decisions, prioritize security measures, and fortify their defenses based on comprehensive and validated intelligence. This comprehensive and validated intelligence allows organizations to operate with the following essential qualities: * Clarity: Obtain a panoramic perspective of your security stance, integrating insights from diverse data sources to illuminate vulnerabilities. * Validity: Rely on rigorously verified information from an array of modules, cementing the precision of your security evaluations. * Fidelity: Delve into an in-depth and accurate analysis of your risk profile, surpassing traditional assessments to deliver a genuine portrayal of your organization's cybersecurity health Extensive and In-Depth ThreatNG Susceptibility and eXposure Scoring ThreatNG Susceptibility and eXposure scoring starts with the ThreatNG Exposure Score, which is a comprehensive metric composed of the following individual measures providing organizations with a holistic view of their cybersecurity posture and its impact on various aspects of their operations: * Breach & Ransomware Susceptibility Evaluate the likelihood of a security breach or ransomware attack. This evaluation considers external attack surface and digital risk intelligence to gauge the organization's susceptibility to these critical threats. The percentage of organizations that have experienced a ransomware attack in the past year is 13% in 2022, up from 11% in 2021. [Verizon Data Breach Investigations Report 2023] * BEC & Phishing Susceptibility Measure an organization's susceptibility to Business Email Compromise (BEC) and phishing attacks. There were over 300,000 reported cases of BEC and phishing attacks in 2022, which is expected to increase to over 400,000 in 2023. [FBI Internet Crime Complaint Center] * Data Leak Susceptibility Assess how prone the organization is to data leaks. Over 10 billion records were exposed in data leaks in 2022, which is expected to increase to over 12 billion in 2023. [Ponemon Institute Cost of a Data Breach Report 2023] * Brand Damage Susceptibility Evaluate an organization's vulnerability to threats that could tarnish its brand reputation. The average cost of a brand damage incident in 2022 was $3.9 million, expected to increase to $4.2 million in 2023. [IBM Security Cost of a Data Breach Report 2023] * Web Application Hijack Susceptibility Evaluates the risk of hijacking, which can lead to unauthorized access or manipulation of web applications. Over 100,000 reported cases of web application hijacking attacks occurred in 2022, which is expected to increase to over 125,000 in 2023. [Verizon Data Breach Investigations Report 2023] * Subdomain Takeover Susceptibility Assess the risk of subdomain takeovers, where attackers can gain control over a subdomain. Thousands of reported subdomain takeover attacks continue to be reported yearly and are expected to increase in the upcoming months. * Cyber Risk Exposure Obtain an overall assessment of the organization's exposure to cyber risks. It combines various risk factors to gauge the organization's vulnerability to multiple threats. The global cost of cybercrime will reach $10.5 trillion by 2025. [Cybersecurity Ventures] * Supply Chain & Third Party Exposure Measure the organization's exposure to risks associated with its supply chain and third-party relationships. Businesses are increasingly reliant on third-party vendors for critical services. This reliance on third-party vendors can make businesses vulnerable to cyberattacks if their vendors are not adequately secured. * ESG Exposure Environmental, Social, and Governance (ESG) Exposure assesses how cybersecurity practices align with ESG principles by reporting an organization’s documented violations. ESG violations affect susceptibility and exposure to cyber-attacks, digital risk levels, and security rating scores. For example, an organization engaged in environmental degradation could attract the attention of hacktivist groups who might attempt to compromise the company's digital assets to make a statement or disrupt operations. The ThreatNG Exposure Score, along with these individual scores, provides a comprehensive and multidimensional view of an organization's cybersecurity risk landscape, enabling them to make informed decisions about all critical functional assets and pillars: * Technical: Helps IT and security teams identify vulnerabilities and weaknesses, allowing them to prioritize and implement necessary security measures effectively. * Strategic: Informs strategic decision-making by highlighting potential risks and their impact on the organization's reputation, compliance, and long-term goals. * Operational: Facilitate streamlining operational processes by focusing on areas where security improvements are most needed, reducing the likelihood of disruptions and data breaches. * Financial: Quantifies cybersecurity risks, aiding financial teams in allocating resources for risk mitigation and potentially reducing financial losses associated with cyber incidents. ThreatNG Security Ratings as a Comprehensive Cybersecurity Compass “The ThreatNG Susceptibility and eXposure Security Ratings empower organizations with a consolidated and contextualized external view of their digital presence to allocate resources effectively, implement targeted security measures, enhance risk management, and ensure compliance, bolstering their cybersecurity posture and resilience,” says Eric Gonzales, Founder of ThreatNG. "For example, it can identify data leak and breach risks, enabling proactive measures in cloud environments; mitigate SaaS-based phishing and hijacking threats with targeted defenses for SaaS security; strengthen data protection with insights into vulnerabilities that could lead to breaches for data security; secure web applications by addressing identified vulnerabilities for application security; prioritize vendor assessments to mitigate supply chain risks for supply chain security; enhance API security to safeguard critical application interfaces; and align security practices with ESG principles for ethical and sustainable cybersecurity." Contact ThreatNG Security today for a Free 30-day Evaluation of their Security Ratings with its in-depth External Attack Surface Management (EASM) and Digital Risk Protection capabilities at threatngsecurity.com/security-ratings. About ThreatNG Security ThreatNG Security is redefining external attack surface management (EASM), digital risk protection, and security ratings with a platform of unmatched breadth, depth, and capabilities in managing technical and business threats across the dark, deep, and open web. Living up to the company mantra (“Security Centric; Not Exclusive”), ThreatNG provides a configurable solution to target, discover, and assess digital assets across a definable ecosystem of organizations, subsidiaries, partners, third parties, supply chains, and customers. Bolstered and maintained by the open source intelligence (OSINT) experts at DarcSight Labs, ThreatNG empowers organizations of all types and sizes to uncover, understand, and manage their external digital threats. CONTACTS Erin Price Email: erin@threatngsecurity.com THREATNG RELEASE SUMMARY ThreatNG Introduces Security and Cybersecurity Ratings Supported by External Attack Surface Management and Digital Risk Protection Intelligence. #HASHTAGS * #BEC * #SubdomainTakeover * #CyberRisk * #ExternalAttackSurfaceManagement * #DataLeak * #EASM * #BrandDamage * #ASM * #AttackSurfaceManagement * #ExposureManagement * #ThreatIntelligence * #CyberSecurityRiskRatings * #Ransomware * #ThirdPartyRiskManagement * #Breach * #SupplyChainSecurity * #WebAppSecurity * #ESG * #Phishing * #SupplyChainRisks * #DigitalRiskProtection * #SecurityRatings SOCIAL MEDIA PROFILES * threatng * threatngsecurity * ThreatNG Security YouTube Channel * threatngsecurity MORE NEWS * November 08, 2023 ThreatNG Security Introduces “Two-Way Tuesdays,” an Interactive Branded Content Campaign Inspired by the True Stories of Technology and Cybersecurity Professionals * February 28, 2023 ThreatNG Security Offers Free Access to Their Groundbreaking Security Platform for Organizations to Assess Cloud and SaaS Vulnerabilities CONTACTS Erin Price Email: erin@threatngsecurity.com SITE NAVIGATION * Home * Home * Submit a Press Release * Services * News * All News * News with Multimedia * News by Industry * News by Subject * News by Language * Tradeshows & Events * Education * Overview * Blog * Distribution & Media * Media & Journalist Tools * Sample Press Release * Find Your News Online * Disclosure Resources * About Us * Overview * Become a Member * Contact Us * Careers * Business Wire Newsroom * Business Wire Events SEARCH SEARCH OPTIONS * Search All * Search News * Search Site * Advanced News Search Advanced News Search * Log In * Sign Up FOLLOW US * Twitter * LinkedIn MORE FROM BUSINESS WIRE * Blog * UK/Ireland * Deutschland * France * Hong Kong * Italy * Japan * Tradeshownews.com BUSINESS WIRE INFORMATION * Contact Us * UK Tax Strategy * Privacy Statement * Manage Cookies * Terms of Use * © 2023 Business Wire Internet Explorer presents a security risk. To ensure the most secure and best overall experience on our website we recommend the latest versions of Chrome, Edge, Firefox, or Safari. Internet Explorer will not be supported as of August 17, 2021. Internet Explorer is no longer supported. To ensure the most secure and best overall experience on our website, we recommend the latest versions of Chrome, Edge, Firefox, or Safari. PRIVACY PREFERENCE CENTER When you visit any website, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalized web experience. Because we respect your right to privacy, you can choose not to allow some types of cookies. Click on the different category headings to find out more and change our default settings. However, blocking some types of cookies may impact your experience of the site and the services we are able to offer. More information Allow All MANAGE CONSENT PREFERENCES STRICTLY NECESSARY COOKIES Always Active Strictly Necessary Cookies These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information. Cookies Details FUNCTIONAL COOKIES Functional Cookies These cookies enable the website to provide enhanced functionality and personalisation. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly. Cookies Details PERFORMANCE COOKIES Performance Cookies These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance. Cookies Details TARGETING COOKIES Targeting Cookies These cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising. Cookies Details SOCIAL MEDIA COOKIES Social Media Cookies These cookies are set by a range of social media services that we have added to the site to enable you to share our content with your friends and networks. They are capable of tracking your browser across other sites and building up a profile of your interests. This may impact the content and messages you see on other websites you visit. If you do not allow these cookies you may not be able to use or see these sharing tools. Cookies Details Confirm My Choices Back Button Back PERFORMANCE COOKIES Vendor Search Search Icon Filter Icon Clear Filters Information storage and access Apply Consent Leg.Interest All Consent Allowed Select All Vendors Select All Vendors All Consent Allowed * 33ACROSS HOST DESCRIPTION VIEW COOKIES REPLACE-WITH-DYANMIC-HOST-ID * Name cookie name * 33ACROSS View Privacy Notice 3 Purposes REPLACE-WITH-DYANMIC-VENDOR-ID Arrow Consent Purposes Location Based Ads Consent Allowed Legitimate Interest Purposes Personalize Require Opt-Out Special Purposes Location Based Ads Features Location Based Ads Special Features Location Based Ads Confirm My Choices By clicking “Accept All Cookies”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. Cookie Policy Cookies Settings Accept All Cookies * Share * Share * Tweet * Mail * Share * Copy * Share